Try our new research platform with insights from 80,000+ expert users
reviewer1442769 - PeerSpot reviewer
System Engineer at a comms service provider with 10,001+ employees
Real User
Good reporting, and we are happy with technical support and the price
Pros and Cons
  • "The most valuable features are reporting from the ePO console and the advanced threat protection (ATP)."
  • "We know that McAfee isn't the best antivirus and it can't protect us 100%, although we are okay with the level of protection that it gives us."

What is our primary use case?

We use this product for our endpoint security.

What is most valuable?

The most valuable features are:  

- reporting facility using the ePO console for conformity and threat identification  

- using the advanced threat protection (ATP) 

- MNE module for customising and securing Windows Bitlocker.

What needs improvement?

We know that McAfee isn't the best antivirus and it can't protect us 100%, although we are okay with the level of protection that it gives us. I don't think that the problem lies in the antivirus, but rather, it's the user. Users are not happy with the antivirus and they try to solve the issue on their own, and that causes very big problems.

The is an incompatibility problem between Mcafee and Linux subsystem for Windows, another that has to do with Outlook and scripts. McAfee knows that, but the problem can't be solved at this time so we try to minimize the effect.

For how long have I used the solution?

We have been using McAfee Endpoint Security for ten years.

Buyer's Guide
Trellix Endpoint Security
November 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,053 professionals have used our research since 2012.

What do I think about the stability of the solution?

In terms of stability, we haven't had many problems.

What do I think about the scalability of the solution?

We use that solution for more that 10k station and servers, and we have space to grow...

How are customer service and support?

The support that we get from McAfee is excellent.

Which solution did I use previously and why did I switch?

We tried Bitdefender, F-Secure, and many other products before settling on McAfee. When our central agency switched to McAfee, we all adopted it.

What's my experience with pricing, setup cost, and licensing?

The price of this product is good.

Which other solutions did I evaluate?

One of our subsidiaries has tried to switch products, although I don't know the reason why. Ultimately, the project was aborted.

What other advice do I have?

My advice for anybody who is looking at McAfee Endpoint Security is simply to use it.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Sr. Security Engineer at a tech vendor with 10,001+ employees
Vendor
The Complete Endpoint Suite has certainly simplified the build procedure.

Valuable Features:

I personally really like what the folks at Intel did when creating the Endpoint Protection Suites. Running the EASI.exe installer from the .zip file simplifies the build process for newer administrators and engineers by installing a base-system tree, basic policies, and streamlining the installation process. 

What most don't seem to grasp is that Endpoint Protection is a Suite Install Package. There are 6 different versions of Endpoint Protection, each coming with different applications installed. Primarily, I usually install the Endpoint Protection Advanced Suite (EPA) & Complete Endpoint Protection Suite (CEE). I recommend installing SQL either on the same box as ePO if you're managing under 5000 endpoints, or on a separate SQL server if higher, overusing the SQL Express that comes with the Installer. The primary reason is that if you use SQL Express, you do not have access to SQL Management Studio. Having access to the data tables and being able to clean up the space on the SQL server over time will be a must. The Complete Endpoint Suite has certainly simplified the build procedure.

Improvements to My Organization:

I have been installing ePO and the separate modules for years. I am a bit biased on Intel Security products as it is how I make my living as a Subject Matter Expert .

Room for Improvement:

There are a few things I wish the folks at Intel would fix. 

The primary for me is with the ePO Query creation. Queries in ePO are powerful tools as they can be used to create dashboards, server tasks, and be exported or rolled up to Senior Management. In older versions of ePO (4.0 & 4.5) the Queries, gave a wide range of data. With ePO 4.6, 5.0, 5.1 & 5.3 the data could be pulled from various installed products to get the data that you were looking for, with the current versions of ePO you can only pull the fields listed in the "Result Type/Feature Group" and it is very limited.

A good example...If i wanted to try and create one report that shows all Common Configuration Enumeration (CCE) data (this data comes from Policy Auditor) while also showing what software is installed from each system  (this data comes from Application Control) and adding in fields such as IPv4, FQDN, OS version, Domain...Simplified, if I could pull Hardware Asset, Software Asset, CCE Data, and Policy Auditor Scoring all on one report, it would make my life so much easier. 

Alas, this cannot be done with the current Query Building setup. The fields that are available are limited to each application installed and are only for that application.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Trellix Endpoint Security
November 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,053 professionals have used our research since 2012.
Systems Engineer at First Datacorp
Real User
Top 10
A solution with a flexible dashboard that can be used for setting up data storage via ELM
Pros and Cons
  • "Trellix Endpoint Security's dashboard is very flexible, and I can create my own user-specific dashboard depending on user privilege or preference."
  • "It would be a lot easier if I could add multiple user accounts within a single device."

What is our primary use case?

Some of the solution's primary use cases include successfully adding devices through ESM GUI and setting up data storage via ELM.

What is most valuable?

Trellix Endpoint Security's dashboard is very flexible, and I can create my own user-specific dashboard depending on user privilege or preference.

What needs improvement?

With Trellix Endpoint Security, adding a device as a data source can be done one by one. Whenever I try to add a device like a firewall or a server, the accounts are enrolled one by one per added data source. It would be a lot easier if I could add multiple user accounts within a single device.

For how long have I used the solution?

I have been testing Trellix Endpoint Security for around three months.

How are customer service and support?

I have tried to contact the solution's technical support team. Whenever I tried to ask for partner support, the Trellix website would ask for my company email details. Then an email would come to my inbox saying that Trellix would get back to me shortly, but unfortunately, they did not. So I couldn't contact Trellix Endpoint Security's technical support.

Which solution did I use previously and why did I switch?

I have worked with other security tools, such as CrowdStrike. The flexibility of the dashboard and filtering are useful features in Trellix Endpoint Security. Also, adding different elements to the SIEM infrastructure is not that complicated with Trellix Endpoint Security.

How was the initial setup?

There's no need for any additional configuration settings to install Trellix Endpoint Security. You just access the web UI, and that's it.

What about the implementation team?

It took me two months to implement Trellix Endpoint Security because of our company's hardware limitations.

My implementation strategy for Trellix Endpoint Security was to build a demonstration based on what the company would like me to do. So I built a SIEM infrastructure and got the images of the different tools first. Then from there, I tried to connect the different devices before I connected the data sources.

What other advice do I have?

My advice is that users should have a fair background in MQL, which really helps a lot in investigating.

Overall, I rate Trellix Endpoint Security an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer931161 - PeerSpot reviewer
CyberSecurity Engineer at a government with 501-1,000 employees
Real User
Scalable and quickly deployable, but they should try moving away from the signature-based model
Pros and Cons
  • "It can be deployed quickly, and it's scalable. Those are the two advantages of it."
  • "Trying to move away from the signature model for antivirus and malware blocking is something that would be nice. Instead of having to update every day, which is signature-based, moving to more of a kernel or architecture-based model would probably be beneficial."

What is our primary use case?

It covers the AV and malware security piece.

How has it helped my organization?

It's mainly for compliance. In terms of products in the market, it's probably not the best, but it's the one that is already paid for under the corporate buy. It basically checks the box that we're doing malware threat prevention and antivirus protection.

What is most valuable?

It can be deployed quickly, and it's scalable. Those are the two advantages of it.

What needs improvement?

Trying to move away from the signature model for antivirus and malware blocking is something that would be nice. Instead of having to update every day, which is signature-based, moving to more of a kernel or architecture-based model would probably be beneficial.

For how long have I used the solution?

It has probably been about a year since we rolled it out.

What do I think about the stability of the solution?

There are no issues. They continue to put out updates weekly or daily. The platform seems to be fairly mature.

What do I think about the scalability of the solution?

It's definitely scalable.

How are customer service and support?

Their tech support is average.

How was the initial setup?

It's pretty straightforward. It can be automated from the central ePolicy orchestrator server. So, the installation is fairly easy because you can automate it with the deployment of your virtual machines and things like that.

What's my experience with pricing, setup cost, and licensing?

I would rate it a three out of five in terms of cost.

What other advice do I have?

I would rate it a seven out of ten. That's mainly because it seems like there are additional security features that could be built into it, or from the signature-based model, it could move to a different model.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
CEO & MD at Gurjartech
Real User
Good DLP but offers problematic encryption
Pros and Cons
  • "The solution is reliable."
  • "The solution has problematic encryption, which needs reforming."

What is most valuable?

I have found DLP to be a valuable feature.

What needs improvement?

When it comes to DLP or McAfee Security Encryption, with which I am happy, I like to make use of the solution for Vault, but find that the encryption is problematic. The system needs reforming. Suppose the solution is utilized on a laptop or desktop and the client wishes to make an assignment to another person but forgot his password. The data cannot be archived or backed up. 

For how long have I used the solution?

I have been using McAfee Endpoint Security for the past five years.

What do I think about the stability of the solution?

The solution is reliable.

What do I think about the scalability of the solution?

Previously, I used the solution for a single site consisting of nearly 300 users. However, as I found it to also be a good tool for DLP endpoint, I now use it for another client with nearly 700 users.

How are customer service and technical support?

Counting from one to ten, this being the highest, I fully support the solution's technical services.

How was the initial setup?

The initial setup is very simple, allowing a person to get the videos or documents on the internet. 

The deployment takes one to two days.

What's my experience with pricing, setup cost, and licensing?

I do licensing on an annual basis and this is what I always recommend to my clients over the monthly option. This is because all my clients are long-term and do not wish to pay on a monthly basis, instead preferring licenses of, perhaps, three years with an additional one or two year option. 

What other advice do I have?

I am using the latest version of the solution minus one. 

Some of our clients deploy the solution on-premises and others use clouds, such as AWS or IBM Cloud. I'm actually a service partner with IBM Cloud and the community manager with AWS Cloud.

We currently have two or three clients utilizing the solution and it can be said that it is a good product. 

The solution is really good and competitively priced, so someone wishing to secure his enterprise or make use of it in an inexpensive fashion should do so. 

I would rate it a seven out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Support Security Engineer at a computer software company with 501-1,000 employees
Real User
An endpoint security solution with a valuable threat prevention feature
Pros and Cons
  • "Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful."
  • "The local technical support could be better."

What is our primary use case?

I work for a company that is a McAfee partner. We sell the solution, and we have engineers that implement the solutions. Basically, I am part of the technical staff that implements the solution on-premise.

We use endpoint security for our clients. We configure policies to scan the computer every single day in some cases and every week or even every moment. Basically, it protects the endpoint, and we have policies to do advanced threat protection.

How has it helped my organization?

Thanks to the implementation of this tool, we have managed to avoid massive virus infection, have visibility into console events and be able to implement action plans to contain threats.

What is most valuable?

Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful. We use the firewall to protect the client's network or even blocks and some kind of traffic that the computer received. The ATP model, I think, is one of the most important features because it can protect the computer when an application doesn't work as expected. It will alert and send messages to the ePO, and we can see everything.

What needs improvement?

The local technical support could be better. It would also help if the engineers can develop some automation features for the on-prem ePO. For example, in the on-prem ePO, you can store the endpoint using the IP address or using text, or using the default version. But in the MVISION ePO, you don't have that kind of feature. It's complicated to sort the endpoint because you have to do it manually.

I also think the detailed level of the detection could be better. In some cases, it's very complicated to figure out which file is the one that is actually impacted, depending on the dashboard you see. The dashboard is one of the most important things in the ePO because it's where you can see everything in a central location. But sometimes, you need to change from one view to another view to find what you're looking for.

For how long have I used the solution?

I have been using McAfee Endpoint Security for about three years.

What do I think about the stability of the solution?

It's very stable. It works as expected, and I am very happy with this solution.

What do I think about the scalability of the solution?

This is a very flexible product. It can be installed on a single physical or virtual server, or well installed on a windows cluster, and if you want to explore other modes it can also be implemented in the AWS cloud or as a SAAS.

How are customer service and technical support?

In some cases, if the report comes from India or America, it's basically an open and shut case. But if the support comes from Latin America, you probably have to scale that problem to another area or another region. You need a person that has more experience with the product.

Which solution did I use previously and why did I switch?

No. 

How was the initial setup?

The initial setup can be both straightforward or complex. Some documentation on clients is very slow. Basically, we spent time implementing the ePO version because sometimes the database from the ePO is too big, and we need to do some things to the database to shrink the space, and it doesn't always work as expected. Sometimes, we have to follow one, two, or three steps to get the data and various scenarios to increase the number of steps because troubleshooting wasn't working.

If we implement MVISION, eventually, it would take around three hours because we have to install the software on the server. We have to do all the upgrades and implement some upgrades to the ePO software. Basically, it's three hours, but it can take five to six hours, depending on the data's size.

What about the implementation team?

We implement this solution for our customers. If you are an engineer, and you have the experience, you can do it. If someone doesn't have experience with the OS, with Windows, or with the product, you might need specialized engineers.

What's my experience with pricing, setup cost, and licensing?

For the issue of implementation costs, you require that the partner you use has qualified personnel to carry out this activity or you can use the professional services of McAfee, but these can be somewhat expensive.

Which other solutions did I evaluate?

Our clients ask us about other solutions like Cylance. I have one client that uses CrowdStrike. If you compare Cylance and McAfee Endpoint Security, the main difference is support. 

McAfee is excellent. You can ask any questions, and with a couple of clicks, you will find the answer to the issue. If you don't find it, you can open a support ticket. Sometimes, the McAfee solutions are very complex to configure. Just in some topics, but on the other hand, very simple to configure.

What other advice do I have?

I recommend that the client needs to be aware of what McAfee can do for them. If the engineer can implement the solution, he'll just follow the book, and he's not going to get the best experience from the product.

To not impact the computer or the endpoint's performance, you need to finetune the policies. If the engineer doesn't have that kind of experience, you won't get the best out of the product. The client needs to get an engineer with a lot of performance tuning experience to get the most out of the product.

On a scale from one to ten, I would give McAfee Endpoint Security a nine.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
it_user421488 - PeerSpot reviewer
Task Leader at a government with 1,001-5,000 employees
Vendor
The most valuable feature that I've found most useful is the availability of seamless AES 256 full-disk encryption.

What is most valuable?

The most valuable feature that I've found most useful is the availability of seamless AES 256 full-disk encryption.

How has it helped my organization?

I don't need to worry about the content of a laptop if it's lost or stolen. It provides better security of laptops when doing foreign travel.

What needs improvement?

I think encryption needs to move to an all hardware-based solution. Software encryption is less efficient than hardware-based. Intel purchased McAfee a few years ago, so this company is set up from the chipset point-of-view.

For how long have I used the solution?

We've used it for six years.

What was my experience with deployment of the solution?

Initially, we ran into issues running full-disk encryption and certain versions of disk defragmentation software. However, this has now been resolved.

What do I think about the stability of the solution?

There have been no issues with the stability.

What do I think about the scalability of the solution?

We have had no issues scaling it for our needs.

How are customer service and technical support?

9/10. I've found technical support to be very good and responsive.

Which solution did I use previously and why did I switch?

We selected this endpoint protection solution due to its multi-platform support, not just Windows (e.g BitLocker). Other reasons were that it has enterprise key storage and recovery, which is very important to us.

How was the initial setup?

It's fairly easy to get going. It's been around for a while now, and there are lots of use cases. You just just need to follow the best practice installation documentation.

What about the implementation team?

We implemented it with the help of a McAfee vendor team.

What's my experience with pricing, setup cost, and licensing?

Everything has a cost. During the initial product evaluation, price was considered but it was not a show stopper.

What other advice do I have?

The central management console, ePO, is very useful. It incorporates file/folder encryption as well as encrypted thumb drive registration and policy management.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1432683 - PeerSpot reviewer
Works at a government with 51-200 employees
Real User
Centralized administration controls, always improving, and reliable
Pros and Cons
  • "The most valuable feature is the centralized console where everything can be controlled by the administration."
  • "There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Sheild. It is quite old and is not fully integrated properly and could be improved."

What is our primary use case?

I use this solution for system security protection.

How has it helped my organization?

McAfee has helped our organization by keeping all of our computer systems secure from viruses or other intrusions.

What is most valuable?

The most valuable feature is the centralized console where everything can be controlled by the administration. McAfee is always improving and is coming out with advanced cloud strategies, you can always rely on them now and for many years ahead.

What needs improvement?

There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Shield. It is quite old and is not fully integrated properly and could be improved.

In an upcoming release, there could be an improvement in performance. There are times the solution can use a lot of resources on the local machines. This normally happens when the system is scanning, the end-user can really notice the performance change. After every new version that is released, there are improvements made. However, there is still room for improvement.

For how long have I used the solution?

I have been using this solution for approximately 15 years.

What do I think about the stability of the solution?

The stability is good, whenever there is an issue there is an update or solution to fix it shortly after.

What do I think about the scalability of the solution?

The scalability has been good for us, we have not expanded very much to know more.

How are customer service and technical support?

The technical support could be improved. We currently have business support and this has been a lot better than the regular support. The business support is more responsive and the resolutions are more thorough. 

What's my experience with pricing, setup cost, and licensing?

The price of the solution is fair, we have a complete security package.

What other advice do I have?

The solution is very good but it is useful and important to have good experience with the endpoint testing machine.

I rate McAfee Endpoint Security nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Muhammad Ejaz ul Hassan - PeerSpot reviewer
Muhammad Ejaz ul HassanCEO at RISE Technologies
Top 5Real User

Centralized administration controls refer to a system in which one centralized authority manages and controls a network, system, or organization. This approach allows for more efficient management and control of resources, data, and security.


Continuous improvement is a key aspect of any successful organization, and centralized administration controls can facilitate this by providing a framework for evaluating and implementing improvements in a systematic manner. With a centralized system, updates and improvements can be rolled out uniformly and quickly, reducing the likelihood of errors or inconsistencies.


Reliability is also an important characteristic of a centralized system. Because there is a single point of control, it is easier to ensure that all components of the system are functioning correctly and that any issues can be addressed promptly. This can result in increased uptime and better overall performance.


However, it is important to note that centralized administration controls can also have drawbacks. For example, they can be vulnerable to single points of failure, and they may not be as adaptable to changing circumstances as decentralized systems. It is important to carefully consider the specific needs of an organization before deciding whether a centralized or decentralized approach is best.

Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.